ACM Conference on Computer and Communications Security

CCS 2017 - Available Artifacts

The following 24th ACM Conference on Computer and Communications Security papers have artifacts available..

All Papers · List By Authors · Institutions

(Ordered by Conference Session)

DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1) Xiao Wang, Samuel Ranellucci, Jonathan Katz
Global-Scale Secure Multiparty Computation [PDF] [Paper] [Artifact] (A1)Xiao Wang, Samuel Ranellucci, Jonathan Katz
Deterministic Browser [PDF] [Paper] [Artifact] (A4)Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [PDF] [Paper] [Artifact] (A5)Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5)Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1)Ruiyu Zhu, Yan Huang, Darion Cassel
The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
Synthesis of Probabilistic Privacy Enforcement [PDF] [Artifact] (B4)Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev
A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4)Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Revive: Rebalancing Off-Blockchain Payment Networks [PDF] [Artifact] (B5)Rami Khalil, Arthur Gervais
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1)Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
Deterministic, Stash-Free Write-Only ORAM [PDF] [Paper] [Artifact] (C1)Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Scaling ORAM for Secure Computation [PDF] [Paper] [Artifact] (C1) Jack Doerner, abhi shelat
Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4)Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu
FAME: Fast Attribute-based Message Encryption [PDF] [Paper] [Artifact] (C4)Shashank Agrawal, Melissa Chase
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1)Brent Carmer, Alex J. Malozemoff, Mariana Raykova
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1)Joel Alwen, Jeremiah Blocki, Ben Harsha
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs [PDF] [Paper] [Artifact] (E5)Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen
Malicious-Secure Private Set Intersection via Dual Execution [PDF] [Paper] [Artifact] (F1)Peter Rindal, Mike Rosulek
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1)Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)Raphael Bost, Brice Minaud, Olga Ohrimenko
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research [PDF] [Paper] [Artifact] (G2)Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5)Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1) Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2)Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida
Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3)Ada Lerner, Tadayoshi Kohno, Franziska Roesner
A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe
HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4)Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1)Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi
walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3)Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang
A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5) Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks [PDF] [Artifact] (I5)Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru
DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3)Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes
Directed Greybox Fuzzing [PDF] [Paper] [Artifact] (K2)Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury
IMF: Inferred Model-based Fuzzer [PDF] [Artifact] (K2)HyungSeok Han, Sang Kil Cha
FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3)Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu
A Formal Foundation for Secure Remote Execution of Enclaves [PDF] [Paper] [Artifact] (K4) Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia